نتایج جستجو برای: routing attack
تعداد نتایج: 132575 فیلتر نتایج به سال:
Routing is a basic step for data exchange. In wireless ad-hoc networks each node acts as a router and executes a routing protocol. Wireless ad-hoc networks are highly resource constrained in terms of network topology, memory and computation power. The reliable data transfer is a difficult task in wireless ad-hoc networks because of resource constraints. A mobile ad-hoc network (MANET) is a kind...
In mobile ad hoc networks, the absence of infrastructure and the consequent absence of authorization facilities impede the usual practice of establishing a practical criterion to distinguishing nodes as trusted and distrusted. Since all nodes in the MANETs would be used as router during working period, secure routing protocols have vital rule in the security of the network. So evaluating the pe...
A Mobile Ad hoc Network (MANET) is a collection of selfconfiguring nodes which uses the wireless link between communicating devices (mobile devices) to form an arbitrary topology without infrastructure. Dynamic topological changes caused by high node mobility make routing and securing communication challenging. Thus, the MANET is vulnerable to attacks due to their dynamic, lack of both distribu...
Mobile Ad Hoc Network (MANET) is a mobile distributed wireless networks. In MANET each node are self capable that support routing functionality in an ad hoc scenario, forwarding of data or exchange of topology information using wireless communications. These characteristic specifies a better scalability of network. But this advantage leads to the scope of security compromising. One of the easy ...
Wireless sensor networks consist a large number of sensor nodes and physical attack suffered by the wireless sensor network is node clone attack. A node clone detection protocol randomly directed exploration is used to detect node clones using forwarding technique based on probability. The simulation is done using NS2 for detection probability, communication cost and storage consumption. An eff...
Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a ne...
The paper demonstrates how traffic load of a shared packet queue can be exploited as a side channel through which protected information leaks to an off-path attacker. The attacker sends to a victim a sequence of identical spoofed segments. The victim responds to each segment in the sequence (the sequence is reflected by the victim) if the segments satisfy a certain condition tested by the attac...
Mobile Ad-hoc NETworks (MANETS) have seen tremendous gmwth in recent years. It is a new paradigm of communication’ in which t h m is no fixed infrasmrcture. Nodes within the radio range of each other can communicate directly over the wireless link, while those that are far apart use other nodes as relays. Routing protocols are the cornerstone of MANET. In the past few years, much research effol...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید